Software token

Results: 476



#Item
61Shellcode / Software / Command shells / Batch file / Exploit / Security token / System call / Shell / Command Prompt / Computing / Scripting languages / System software

An Introduction to MOSDEF Dave Aitel Immunity, Inc http://www.immunitysec.com Who am I?

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
62Password / Security token / Single sign-on / Challenge-response authentication / User / Secure Shell / Cryptographic software / Password manager / OTPW / Computer security / Security / Access control

Peer-to-Peer Single Sign-On Security Scheme for Today’s Smart Spaces? Enrique Soriano Salvador Francisco J. Ballesteros Gorka Guardiola Laboratorio de Sistemas

Add to Reading List

Source URL: lsub.org

Language: English - Date: 2014-05-08 10:53:16
63Access token / Filesystem Hierarchy Standard / Software / Computing / System software / Daemon

Stanford University July 26, 2014 Daemons, PAGs, and Automated Authentication

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
64Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 iOS 8.1 or later Contents Page 4

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2015-03-12 04:26:12
65Cryptographic protocols / Cryptographic software / Internet protocols / Password / Security token / S/KEY / One-time password / Key-agreement protocol / Salt / Security / Computer security / Cryptography

Prompted User Retrieval of Secret Entropy: The Passmaze Protocol Daniel R. L. Brown∗ December 15, 2005 Abstract A prompting protocol permits users to securely retrieve secrets with greater entropy than

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-23 10:31:13
66Cryptography / System software / Password / USB flash drive / Security token / Ghost / Windows / Encrypting File System / BitLocker Drive Encryption / Disk encryption / Software / Cryptographic software

TM ENTERPRISE EDITION Version 4

Add to Reading List

Source URL: autonomicresources.com

Language: English - Date: 2012-12-12 15:18:57
67Security token / Two-factor authentication / One-time password / Software token / Authentication / Password / Strong authentication / Password manager / Anakam / Security / Computer security / Cryptography

Advanced Authentication Methods: Software vs. Hardware

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2013-04-26 09:39:23
68Public-key cryptography / Cryptographic software / PKCS11 / Electronic commerce / PKCS / Hardware security module / OpenSSL / OpenSC / Security token / Cryptography / Cryptography standards / Smart cards

An introduction to the use of HSM

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:51
69Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 Contents Page 4

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2015-03-11 18:21:13
70Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 iOS 8.1 or later Contents Page 4

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2015-03-18 19:04:20
UPDATE